Encryption Services. What Are Encryption Services? Terminology. System and Software Requirements APPENDIX 5
|
|
- Kelly Cox
- 8 years ago
- Views:
Transcription
1 207 APPENDIX 5 Encryption Services What Are Encryption Services? 207 Terminology 207 System and Software Requirements 207 Requirements for SAS Proprietary Encryption Services 208 Communications Access Methods Support 208 North American and International Encryption Services Packages 208 Data Encryption Algorithms 209 SAS System Options 210 SAS/CONNECT Example 211 SAS/CONNECT Local Host 211 SAS/CONNECT Remote Host 212 SAS/SHARE Example 212 SAS/SHARE Client 212 SAS/SHARE Server 212 What Are Encryption Services? Encryption services protect data that is sent between hosts across a network. Encryption services use a reversible algorithm to convert plain-text data into an unintelligible form, thus protecting data from being used by unauthorized parties. Terminology This appendix addresses encryption services for both SAS/CONNECT and SAS/ SHARE software. The terms local host and remote host are used to designate local and remote sides for SAS/CONNECT and client and server sides for SAS/SHARE. System and Software Requirements You must purchase a license for SAS/SECURE in order to use the encryption services of these products: 3 RSA BSAFE Crypto-C Toolkit 3 New in Version 8, RSA BSAFE Crypto-J Toolkit, which supports Java clients that access SAS servers. The RSA BSAFE Crypto-J Toolkit is supported on these platforms:
2 208 Requirements for SAS Proprietary Encryption Services 4 Appendix 5 3 OpenVMS Alpha 3 OpenVMS VAX 3 OS/2 3 AIX 3 Compaq Tru64 UNIX (formerly Compaq s DIGITAL UNIX) 3 HP-UX 3 Solaris 2 3 OS/390. The RSA BSAFE Crypto-J Toolkit runs on any platform that has installed the Java Development Kit, Version 1.1 or later. CryptoAPI from Microsoft is an application programming interface that provides access to the cryptographic services that are provided by: 3 Windows 95 and Windows 98 (as part of Internet Explorer 3.0+) 3 Windows NT 4.0+ (as part of the operating system). Service Pack 3 or a subsequent release must be installed. You must have either of the following packages installed on your Windows host to use CryptoAPI: 3 Microsoft Base Cryptographic Service Provider 3 Microsoft Enhanced Cryptographic Service Provider. Requirements for SAS Proprietary Encryption Services You can use the SAS Proprietary encryption services on all platforms. Encryption services provided by SAS are free of charge and require no additional software license. Communications Access Methods Support Encryption services provided by the RSA BSAFE Crypto-C Toolkit and the Microsoft CryptoAPI are available with the following communications access methods on the supported hosts: 3 TCP/IP 3 DECnet 3 NetBIOS. The RSA BSAFE Crypto-J Toolkit supports the TCP/IP access method only. For example, you can use encryption services to connect two UNIX hosts when using the TCP/IP access method. Also, you can connect two Windows hosts by using either the TCP/IP, the DECnet, or the NetBIOS access method. See Communications Access Methods for SAS/CONNECT and SAS/SHARE Software for a definitive list of supported host connections by access method. North American and International Encryption Services Packages United States export regulations on encryption software restrict access to SAS/ SECURE software and related technical data as follows:
3 Encryption Services 4 Data Encryption Algorithms The SAS/SECURE Domestic version may be used or accessed only within the United States or Canada by citizens or lawfully admitted permanent residents of those countries or as otherwise permitted by special export license. 2 The SAS/SECURE International and the SAS/SECURE for Windows versions may not be exported to terrorist supporting or embargoed destinations or parties. In addition to export regulations, SAS software licensing documents may limit countries of use. Because of these export key-length restrictions, encryption services are packaged in the following forms: North American (U. S. and Canada) available to North American customers and certain other customers by special export license, supports 1024-bit or 512-bit RSA keys in combination with the following algorithms: 3 RC2 using 128-bit or 40-bit keys 3 RC4 using 128-bit or 40-bit keys 3 DES using 56-bit keys 3 Triple DES using 168-bit keys International available to International customers, supports two types of encryption: bit RSA keys in combination with the 40-bit key algorithms RC2 and RC4 3 new in Version 8, the 1024-bit RSA keys in combination with the 56-bit DES algorithm. Data Encryption Algorithms The encryption algorithms as well as the SAS Proprietary algorithm are defined as follows: RC2 A proprietary algorithm developed by RSA Data Security, Inc., RC2 is an alternative to DES. The algorithm expands a single message by up to 8 bytes. RC2 is a block cipher that encrypts data in blocks of 64 bits. The size of the output of the algorithm is always a multiple of the block size. The RC2 key size can range from 8 to 256 bits. RC4 A proprietary algorithm developed by RSA Data Security, Inc., RC4 is a stream cipher. A stream cipher encrypts one byte at a time. The RC4 key size can range from 8 to 2048 bits. Note: The term cipher means encryption algorithm. 4 DES An acronym for Data Encryption Standard, DES was developed by IBM. The algorithm expands a single message by up to 8 bytes. DES is a block cipher that encrypts data in blocks of 64 bits by using a 56-bit key. Triple DES Triple DES executes DES three times on the data in order to exploit a key size that is three times that of DES. The algorithm expands a single message by up to 8 bytes. DES is a block cipher that encrypts data in blocks of 64 bits.
4 210 SAS System Options 4 Appendix 5 SAS Proprietary This provides basic encryption services on all platforms and requires no additional product licenses. The algorithm expands a single message by approximately one-third. It uses a 32-bit key. The key sizes that are used are based on the encryption software that is available on your host and the value that is assigned to the NETENCRKEYLEN option (see the next section). SAS System Options Note: These options do not apply to hosts that use the RSA BSAFE Crypto-J Toolkit. For Java client options, see other documentation (such as the documentation about the SAS/CONNECT Driver for Java that is provided with SAS/IntrNet software). 4 For hosts that use the RSA BSAFE Crypto-C Toolkit or the Microsoft CryptoAPI, here are the SAS options that set encryption services attributes. NETENCRYPT=YES NO or NETENCRYPT NONETENCRYPT Set this option at both the local and remote hosts. At the remote host, this option specifies that encryption is required for each connection from a local host SAS session. At the local side, this option specifies that the local host must connect only to a remote host that supports encryption. By default, encryption is used if the NETENCRYPTALGORITHM= option is set and if both the local and remote sides are capable of encryption. If encryption algorithms were specified but either the local or the remote side is incapable of encryption, then encryption is not performed. Encryption may not be supported at the local or at the remote host for these reasons: 3 You are running a release of SAS (prior to Version 7) that does not support encryption. 3 Your site has not purchased a SAS/SECURE license for a specific platform. 3 You specified incompatible encryption algorithms in the local and the remote host SAS sessions. 3 You do not have a cryptographic service provider installed. NETENCRYPTALGORITHM=( algorithm1, algorithm2,...) If you specify more than one algorithm, enclose the algorithm names in parenthesis and use commas to separate them. If there are embedded blanks in the algorithm name, enclose each algorithm with quotation marks. The alias is NETENCRALG. Set this option at the remote host and, optionally, at the local host to specify one or more encryption algorithms to use in a SAS session. However, the local and remote hosts must share an encryption algorithm in common. If you specify the option in the remote host session only, the local side attempts to select an algorithm that was specified at the remote host. If you also set the option at the
5 Encryption Services 4 SAS/CONNECT Local Host 211 local host and specify an algorithm that is not specified at the remote host, the attempt by the local host to connect to that remote host fails. Valid values for this option are RC2 RC4 DES TripleDES SAS Proprietary NETENCRYPTKEYLEN=n Set this option in either the local or the remote host SAS session. It specifies the key length to be used by the encryption algorithm. The alias is NETENCRKEY. Valid values for this option are 128 specifies 1024-bit RSA and 128-bit RC2 and RC4 key algorithms. 40 specifies 512-bit RSA and 40-bit RC2 and RC4 key algorithms. 0 no value is set. This is the default. If you require extra security, set NETENCRYPTKEYLEN=128. If you want to save CPU, set NETENCRYPTKEYLEN=40. By default, if you try to connect to a host that is capable of only a 40-bit key algorithm with a host that is capable of both 40- bit and 128-bit, the connection using the lesser of the two key lengths is used. If both hosts are capable of 128-bit, then the 128-bit is used. To explicitly set one or the other, set the NETENCRYPTKEYLEN SAS option. NETMAC NONETMAC This option controls the use of Message Authentication Codes (MACs) on network communications. A Message Authentication Code is the equivalent of a checksum that is used to ensure that the original message has not been modified. The MAC integrity checking adds an extra 16 bytes to RC4 encrypted messages and an extra 24 bytes to RC2, DES, and TripleDES encrypted messages. You set this option at either the local or the remote host. The default is NETMAC. SAS/CONNECT Example SAS/CONNECT Local Host Specify the following statements in a local host session: options netencryptalgorithm=rc4; options remote=unxnode comamid=tcp; signon; The NETENCRYPTALGORITHM= option specifies that the RC4 algorithm be used for encryption in the local host session.
6 212 SAS/CONNECT Remote Host 4 Appendix 5 SAS/CONNECT Remote Host The following example illustrates the content of the executable file that a UNIX spawner program uses to start SAS and to specify encryption in a SAS/CONNECT remote host session: # # mystartup # #!/bin/ksh. ~/.profile sas dmr -noterminal -no$syntaxcheck -comamid tcp -netencryptalgorithm rc4 -nete The NETENCRYPTALGORITHM= option specifies that the RC4 algorithm be used for encryption of all data that is exchanged with connecting local hosts. The NETENCRYPT option specifies that encryption is required by any local host that accesses this remote host. SAS/SHARE Example SAS/SHARE Client Specify the following statements in a client session: options netencryptalgorithm=rc4; options comamid=tcp; libname sasdata edc.prog2.sasdata server=rmthost.share1; The NETENCRYPTALGORITHM= option specifies that the RC4 algorithm be used for encryption in the client session. SAS/SHARE Server Specify the following statements in a SAS/SHARE server session: options netencrypt netencryptalgorithm=rc4; options comamid=tcp; proc server id=share1; run; The NETENCRYPT option specifies that encryption is required by any client that accesses this server. The NETENCRYPTALGORITHM= option specifies that the RC4 algorithm be used for encryption of all data that is exchanged with connecting clients.
7 The correct bibliographic citation for this manual is as follows: SAS Institute Inc., SAS/ SHARE User s Guide, Version 8, Cary, NC: SAS Institute Inc., pp SAS/SHARE User s Guide, Version 8 Copyright 1999 by SAS Institute Inc., Cary, NC, USA. ISBN All rights reserved. Printed in the United States of America. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, or otherwise, without the prior written permission of the publisher, SAS Institute Inc. U.S. Government Restricted Rights Notice. Use, duplication, or disclosure of the software by the government is subject to restrictions as set forth in FAR Commercial Computer Software-Restricted Rights (June 1987). SAS Institute Inc., SAS Campus Drive, Cary, North Carolina st printing, September 1999 SAS and all other SAS Institute Inc. product or service names are registered trademarks or trademarks of SAS Institute Inc. in the USA and other countries. indicates USA registration. IBM, AIX, DB2, OS/2, OS/390, RMT TM, RS/6000, System/370 TM, and System/390 are registered trademarks or trademarks of International Business Machines Corporation. ORACLE is a registered trademark or trademark of Oracle Corporation. indicates USA registration. Other brand and product names are registered trademarks or trademarks of their respective companies. The Institute is a private company devoted to the support and further development of its software and related services.
When to Move a SAS File between Hosts
3 CHAPTER Moving and Accessing SAS Files between Hosts When to Move a SAS File between Hosts 3 When to Access a SAS File on a Remote Host 3 Host Types Supported According to SAS Release 4 Avoiding and
More informationUNIX Operating Environment
97 CHAPTER 14 UNIX Operating Environment Specifying File Attributes for UNIX 97 Determining the SAS Release Used to Create a Member 97 Creating a Transport File on Tape 98 Copying the Transport File from
More informationOS/2: TELNET Access Method
259 CHAPTER 18 OS/2: TELNET Access Method SAS Support for TELNET on OS/2 259 SAS/CONNECT 259 System and Software Requirements for SAS/CONNECT 259 Local Host Tasks 260 Configuring Local and Remote Host
More informationAnalyzing the Server Log
87 CHAPTER 7 Analyzing the Server Log Audience 87 Introduction 87 Starting the Server Log 88 Using the Server Log Analysis Tools 88 Customizing the Programs 89 Executing the Driver Program 89 About the
More informationCommunications Access Methods for SAS/CONNECT 9.3 and SAS/SHARE 9.3 Second Edition
Communications Access Methods for SAS/CONNECT 9.3 and SAS/SHARE 9.3 Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2012. Communications
More informationEncryption in SAS 9.2
Encryption in SAS 9.2 The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2009. Encryption in SAS 9.2. Cary, NC: SAS Institute Inc. Encryption in SAS 9.2 Copyright 2009,
More informationEncryption in SAS 9.3 Second Edition
Encryption in SAS 9.3 Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2012. Encryption in SAS 9.3, Second Edition. Cary, NC: SAS Institute
More informationCommunications Access Methods for SAS/CONNECT 9.4 and SAS/SHARE 9.4 Second Edition
Communications Access Methods for SAS/CONNECT 9.4 and SAS/SHARE 9.4 Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. Communications
More information9.1 SAS/ACCESS. Interface to SAP BW. User s Guide
SAS/ACCESS 9.1 Interface to SAP BW User s Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2004. SAS/ACCESS 9.1 Interface to SAP BW: User s Guide. Cary, NC: SAS
More informationEncryption in SAS 9.4 Fifth Edition
Encryption in SAS 9.4 Fifth Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. Encryption in SAS 9.4, Fifth Edition. Cary, NC: SAS Institute
More informationDBF Chapter. Note to UNIX and OS/390 Users. Import/Export Facility CHAPTER 7
97 CHAPTER 7 DBF Chapter Note to UNIX and OS/390 Users 97 Import/Export Facility 97 Understanding DBF Essentials 98 DBF Files 98 DBF File Naming Conventions 99 DBF File Data Types 99 ACCESS Procedure Data
More informationOverview. NT Event Log. CHAPTER 8 Enhancements for SAS Users under Windows NT
177 CHAPTER 8 Enhancements for SAS Users under Windows NT Overview 177 NT Event Log 177 Sending Messages to the NT Event Log Using a User-Written Function 178 Examples of Using the User-Written Function
More informationSAS 9.3 Intelligence Platform
SAS 9.3 Intelligence Platform Application Server Administration Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2011. SAS SAS 9.3 Intelligence
More informationClient/Server Setup and Implementation: Web and non-web Environments John Laing, SAS Institute (Canada) Inc., Toronto, ON
Paper 19-25 Client/Server Setup and Implementation: Web and non-web Environments John Laing, SAS Institute (Canada) Inc., Toronto, ON ABSTRACT Client/server setup is becoming more and more challenging.
More informationInstallation Instructions for Version 8 (TS M1) of the SAS System for Microsoft Windows
Installation Instructions for Version 8 (TS M1) of the SAS System for Microsoft Windows Table of Contents Chapter 1, Introduction...1 Terminology and Symbols Used in this Document...1 SASROOT Directory...1
More informationSAS 9.4 PC Files Server
SAS 9.4 PC Files Server Installation and Configuration Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. SAS 9.4 PC Files Server: Installation
More informationGuide to Operating SAS IT Resource Management 3.5 without a Middle Tier
Guide to Operating SAS IT Resource Management 3.5 without a Middle Tier SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. Guide to Operating SAS
More informationChapter 32 Histograms and Bar Charts. Chapter Table of Contents VARIABLES...470 METHOD...471 OUTPUT...472 REFERENCES...474
Chapter 32 Histograms and Bar Charts Chapter Table of Contents VARIABLES...470 METHOD...471 OUTPUT...472 REFERENCES...474 467 Part 3. Introduction 468 Chapter 32 Histograms and Bar Charts Bar charts are
More informationCS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)
Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES) 1 A little background information on cipher
More informationSAS Data Set Encryption Options
Technical Paper SAS Data Set Encryption Options SAS product interaction with encrypted data storage Table of Contents Introduction: What Is Encryption?... 1 Test Configuration... 1 Data... 1 Code... 2
More informationMQSeries. Clients GC33-1632-07
MQSeries Clients GC33-1632-07 MQSeries Clients GC33-1632-07 Note! Before using this information and the product it supports, be sure to read the general information under Appendix C. Notices on page 169.
More informationProcase Consulting. APEX 4.1 Introduction. Oleg Mochkin
Procase Consulting APEX 4.1 Introduction Oleg Mochkin 1 APEX Users 2 APEX Express Use Cases 3 APEX as Solution Unique RAD tools for Oracle Database Browser based development Declarative way to build Web
More informationUser Installation Guide for SAS 9.1 Foundation for 64-bit Microsoft Windows
User Installation Guide for SAS 9.1 Foundation for 64-bit Microsoft Windows Installation Instructions Where to Begin SAS Setup Wizard Repair or Remove SAS Software Glossary Where to Begin Most people who
More informationSAS 9.4 Intelligence Platform
SAS 9.4 Intelligence Platform Application Server Administration Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2013. SAS 9.4 Intelligence Platform:
More informationAn Introduction to SAS/SHARE, By Example
Paper 020-29 An Introduction to SAS/SHARE, By Example Larry Altmayer, U.S. Census Bureau, Washington, DC ABSTRACT SAS/SHARE software is a useful tool for allowing several users to simultaneously access
More informationSAS. 9.4 Guide to Software Updates. SAS Documentation
SAS 9.4 Guide to Software Updates SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2013. SAS 9.4 Guide to Software Updates. Cary, NC: SAS Institute
More informationSAS/ACCESS 9.3 Interface to PC Files
SAS/ACCESS 9.3 Interface to PC Files Reference SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2011. SAS/ACCESS 9.3 Interface to Files: Reference.
More informationChapter 6 INTERVALS Statement. Chapter Table of Contents
Chapter 6 INTERVALS Statement Chapter Table of Contents OVERVIEW...217 GETTING STARTED...218 ComputingStatisticalIntervals...218 ComputingOne-SidedLowerPredictionLimits...220 SYNTAX...222 SummaryofOptions...222
More informationSAS. 9.1.3 Intelligence Platform. System Administration Guide
SAS 9.1.3 Intelligence Platform System Administration Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2006. SAS 9.1.3 Intelligence Platform: System Administration
More informationFSM Encryption Whitepaper
FSM Encryption Whitepaper FileNet System Monitor 4.0.0 FileNet Corporation Table of Contents 1. Notices... 1 2. Copyright Notice... 2 Trademarks... 2 Notice... 2 3. Preface... 4 Related Documents... 4
More informationAccessing a Remote SAS Data Library. Transcript
Accessing a Remote SAS Data Library Transcript Accessing a Remote SAS Data Library Transcript was developed by Michelle Buchecker. Additional contributions were made by Christine Riddiough and Cheryl Doninger.
More informationSAS 9.3 Drivers for ODBC
SAS 9.3 Drivers for ODBC User s Guide Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2011. SAS 9.3 Drivers for ODBC: User s Guide,
More informationSAS 9.2 Integration Technologies. Java Client Developer s Guide
SAS 9.2 Integration Technologies Java Client Developer s Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2009. SAS 9.2 Integration Technologies: Java Client Developer
More informationScheduling in SAS 9.3
Scheduling in SAS 9.3 SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2011. Scheduling in SAS 9.3. Cary, NC: SAS Institute Inc. Scheduling in SAS 9.3
More informationSAS 9.3 Logging: Configuration and Programming Reference
SAS 9.3 Logging: Configuration and Programming Reference SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2011. SAS 9.3 Logging: Configuration and
More informationSAS 9.4 Logging. Configuration and Programming Reference Second Edition. SAS Documentation
SAS 9.4 Logging Configuration and Programming Reference Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. SAS 9.4 Logging: Configuration
More informationIBM Client Security Solutions. Client Security User's Guide
IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First
More informationSystem Requirements. SAS Regular Price Optimization 4.2. Server Tier. SAS Regular Price Optimization Long Jobs Server
System Requirements SAS Regular Price Optimization 4.2 Server Tier For information about the file sizes required for the server tier software, please visit Install Center (http://support.sas.com/installcenter)
More informationSAS University Edition: Installation Guide for Windows
SAS University Edition: Installation Guide for Windows i 17 June 2014 The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. SAS University Edition: Installation Guide
More informationConfiguring Secure Socket Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Systems That Use Oracle WebLogic 10.
Configuring Secure Socket Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Systems That Use Oracle WebLogic 10.3 Table of Contents Overview... 1 Configuring One-Way Secure Socket
More informationConfiguring Integrated Windows Authentication for JBoss with SAS 9.2 Web Applications
Configuring Integrated Windows Authentication for JBoss with SAS 9.2 Web Applications Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc., Configuring
More informationInitializing SAS Environment Manager Service Architecture Framework for SAS 9.4M2. Last revised September 26, 2014
Initializing SAS Environment Manager Service Architecture Framework for SAS 9.4M2 Last revised September 26, 2014 i Copyright Notice All rights reserved. Printed in the United States of America. No part
More informationINSTALLATION INSTRUCTIONS. Installation Instructions for Release 8.2 (TS2M0) of the SAS System for Microsoft Windows
INSTALLATION INSTRUCTIONS Installation Instructions for Release 8.2 (TS2M0) of the SAS System for Microsoft Windows Installation Instructions for Release 8.2 (TS2M0) of the SAS System for Microsoft Windows
More informationTechnical Paper. Migrating a SAS Deployment to Microsoft Windows x64
Technical Paper Migrating a SAS Deployment to Microsoft Windows x64 Table of Contents Abstract... 1 Introduction... 1 Why Upgrade to 64-Bit SAS?... 1 Standard Upgrade and Migration Tasks... 2 Special
More informationTransferring vs. Transporting Between SAS Operating Environments Mimi Lou, Medical College of Georgia, Augusta, GA
CC13 Transferring vs. Transporting Between SAS Operating Environments Mimi Lou, Medical College of Georgia, Augusta, GA ABSTRACT Prior to SAS version 8, permanent SAS data sets cannot be moved directly
More informationSAS/IntrNet 9.4: Application Dispatcher
SAS/IntrNet 9.4: Application Dispatcher SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2013. SAS/IntrNet 9.4: Application Dispatcher. Cary, NC: SAS
More informationOnDemand for Academics
SAS OnDemand for Academics User s Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. SAS OnDemand for Academics: User's Guide. Cary, NC:
More informationSystem Requirements for SAS 9.2 Foundation for Microsoft Windows for x64 Copyright 2011, SAS Institute Inc., Cary, NC, USA.
Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc., System Requirements for SAS 9.2 Foundation for Microsoft Windows for x64, Cary, NC: SAS Institute
More informationScheduling in SAS 9.4 Second Edition
Scheduling in SAS 9.4 Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. Scheduling in SAS 9.4, Second Edition. Cary, NC: SAS Institute
More informationSAS University Edition: Installation Guide for Linux
SAS University Edition: Installation Guide for Linux i 17 June 2014 The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. SAS University Edition: Installation Guide
More informationTN3270 Security Enhancements
TN3270 Security Enhancements SecureWay Communication Server for OS/390 Copyright IBM Corporation, 1999 1 Support in OS/390 V2.R6 Copyright IBM Corporation, 1999 2 Secure Sockets Layer - What is it? Application
More informationWhite Paper BMC Remedy Action Request System Security
White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information
More informationGeneral Guide to Installation and Migration for Client/Server BAMS/DSS. Release 6.0
General Guide to Installation and Migration for Client/Server BAMS/DSS Release 6.0 April 2002 5700 SW 34th Street Suite 1235 Gainesville, Florida 32608-5371 Phone (352) 381-4400 Fax (352) 381-4444 E-mail
More informationSAS. 9.3 Guide to Software Updates. SAS Documentation
SAS 9.3 Guide to Software Updates SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2011. SAS 9.3 Guide to Software Updates. Cary, NC: SAS Institute
More informationSUGI 29 Applications Development
Backing up File Systems with Hierarchical Structure Using SAS/CONNECT Fagen Xie, Kaiser Permanent Southern California, California, USA Wansu Chen, Kaiser Permanent Southern California, California, USA
More informationChapter 2 The Data Table. Chapter Table of Contents
Chapter 2 The Data Table Chapter Table of Contents Introduction... 21 Bringing in Data... 22 OpeningLocalFiles... 22 OpeningSASFiles... 27 UsingtheQueryWindow... 28 Modifying Tables... 31 Viewing and Editing
More informationVersion Highlights. CertainT 100 SSL Accelerator. Version 2.11. International. New hardware and software version. North America
Version Highlights SSL Accelerator Version 2.11 New hardware and software version North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware Ltd. 22
More information9.1 SAS. SQL Query Window. User s Guide
SAS 9.1 SQL Query Window User s Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2004. SAS 9.1 SQL Query Window User s Guide. Cary, NC: SAS Institute Inc. SAS
More informationTechnical Paper. Defining an ODBC Library in SAS 9.2 Management Console Using Microsoft Windows NT Authentication
Technical Paper Defining an ODBC Library in SAS 9.2 Management Console Using Microsoft Windows NT Authentication Release Information Content Version: 1.0 October 2015. Trademarks and Patents SAS Institute
More informationChapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
More informationHR Data Retrieval in a LDAP- Enabled Directory Service
HR Data Retrieval in a LDAP- Enabled Directory Service HELP.PORTMANAGER Release 50A Copyright Copyright 2001 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in
More informationSAS 9.4 Intelligence Platform: Migration Guide, Second Edition
SAS 9.4 Intelligence Platform: Migration Guide, Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. SAS 9.4 Intelligence Platform:
More informationInteroperability of Bloombase StoreSafe and Thales e-security keyauthority for Data At- Rest Encryption
Bloombase Interoperability Program P1 2015 Bloombase, Inc. Interoperability of Bloombase StoreSafe and Thales e-security keyauthority for Data At- Rest Encryption April, 2015 Executive Summary Thales e-security
More informationSAS Visual Analytics 7.1 for SAS Cloud. Quick-Start Guide
SAS Visual Analytics 7.1 for SAS Cloud Quick-Start Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. SAS Visual Analytics 7.1 for SAS Cloud: Quick-Start Guide.
More informationERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
More informationAbstract. Introduction. Web Technology and Thin Clients. What s New in Java Version 1.1
Overview of Java Components and Applets in SAS/IntrNet Software Barbara Walters, SAS Institute Inc., Cary, NC Don Chapman, SAS Institute Inc., Cary, NC Abstract This paper describes the Java components
More informationFirewall Access Request Form
SECTION 1 TO BE COMPLETED BY THE APPLICANT By completing the below information the requestor/applicant acknowledges and agrees that he/she has read, understood and will comply with the following: CHECK
More informationInstallation & Configuration Guide
EVault InfoStage MS SQL Server Plug-In 4.20 Installation & Configuration Guide June 2003 This manual describes how to install, backup and restore using EVault InfoStage MS SQL Server Plug-In, Version 4.20
More informationSAS/IntrNet 9.3: Application Dispatcher
SAS/IntrNet 9.3: Application Dispatcher SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2011. SAS/IntrNet 9.3: Application Dispatcher. Cary, NC: SAS
More informationMicro Focus. Data Express. SQL Server Module User Guide
Micro Focus Data Express Copyright 2007-2008 Micro Focus (IP) Ltd. All rights reserved. Micro Focus (IP) Ltd. has made every effort to ensure that this book is correct and accurate, but reserves the right
More informationSAS 9.4 Intelligence Platform
SAS 9.4 Intelligence Platform Installation and Configuration Guide Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. SAS 9.4 Intelligence
More informationImplementing a SAS 9.3 Enterprise BI Server Deployment TS-811. in Microsoft Windows Operating Environments
Implementing a SAS 9.3 Enterprise BI Server Deployment TS-811 in Microsoft Windows Operating Environments Table of Contents Introduction... 1 Step 1: Create a SAS Software Depot..... 1 Step 2: Prepare
More informationSAS Add-In 2.1 for Microsoft Office: Getting Started with Data Analysis
SAS Add-In 2.1 for Microsoft Office: Getting Started with Data Analysis The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2007. SAS Add-In 2.1 for Microsoft Office: Getting
More informationBusinessObjects Data Federator XI 3.0 SP1 for Windows
Revision Date: December 10, 2008 BusinessObjects Data Federator XI 3.0 SP1 for Windows Overview Contents This document lists specific platforms and configurations for the BusinessObjects Data Federator
More informationSystem Requirements and Platform Support Guide
Foglight 5.6.7 System Requirements and Platform Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
More informationDEPLOYMENT ROADMAP March 2015
DEPLOYMENT ROADMAP March 2015 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and may
More informationStreamServe Persuasion SP5 Supported platforms and software
StreamServe Persuasion SP5 Supported platforms and software Reference Guide Rev A StreamServe Persuasion SP5 Reference Guide Rev A 2001-2010 STREAMSERVE, INC. ALL RIGHTS RESERVED United States patent #7,127,520
More informationSecureVault Online Backup Service FAQ
SecureVault Online Backup Service FAQ C0110 SecureVault FAQ (EN) - 1 - Rev. 19-Nov-2007 Table of Contents 1. General 4 Q1. Can I exchange the client type between SecureVault PC Backup Manager and SecureVault
More informationOracle Business Intelligence Publisher. 1 Oracle Business Intelligence Publisher Certification. Certification Information 10g Release 3 (10.1.3.4.
Oracle Business Intelligence Publisher Certification Information 10g Release 3 (10.1.3.4.2) E12692-08 September 2011 This document outlines the certified hardware and software configurations for Oracle
More informationSAS 9.4 In-Database Products
SAS 9.4 In-Database Products Administrator s Guide Fifth Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. SAS 9.4 In-Database Products:
More informationThis brochure has been created using Acrobat PDF format from Adobe Systems Incorporated. All Rights Reserved. Copyright 2009, Hitachi, Ltd.
This brochure has been created using Acrobat PDF format from Adobe Systems Incorporated. All Rights Reserved. Copyright 2009, Hitachi, Ltd. 1 Job Management Partner 1 Version 9 Availability Management
More informationCA DLP. Release Notes for Advanced Encryption. r12.0
CA DLP Release Notes for Advanced Encryption r12.0 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes
More informationHow To Use A Sas Server On A Java Computer Or A Java.Net Computer (Sas) On A Microsoft Microsoft Server (Sasa) On An Ipo (Sauge) Or A Microsas (Sask
Exploiting SAS Software Using Java Technology Barbara Walters, SAS Institute Inc., Cary, NC Abstract This paper describes how to use Java technology with SAS software. SAS Institute currently offers several
More informationz/os Firewall Technology Overview
z/os Firewall Technology Overview Mary Sweat E - Mail: sweatm@us.ibm.com Washington System Center OS/390 Firewall/VPN 1 Firewall Technologies Tools Included with the OS/390 Security Server Configuration
More informationERserver. iseries. Securing applications with SSL
ERserver iseries Securing applications with SSL ERserver iseries Securing applications with SSL Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users
More informationSystem Requirements for SAS 9.4 Foundation for Linux for x64
System Requirements for SAS 9.4 Foundation for Linux for x64 Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. System Requirements for SAS 9.4
More informationDOCUMENTATION MICROSOFT SQL BACKUP & RESTORE OPERATIONS
DOCUMENTATION MICROSOFT SQL BACKUP & RESTORE OPERATIONS Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited. No part of this publication
More informationGrid Computing in SAS 9.4 Third Edition
Grid Computing in SAS 9.4 Third Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. Grid Computing in SAS 9.4, Third Edition. Cary, NC:
More informationDelivering Dynamic Content with the SAS Stored Process Web Application
Delivering Dynamic Content with the SAS Stored Process Web Application Frederick Pratter, Eastern Oregon University, La Grande, OR ABSTRACT Many Web developers have been moving away from the CGI technology
More informationThe Encryption Technology of Automatic Teller Machine Networks
Software Engineering 4C03 Winter 2005 The Encryption Technology of Automatic Teller Machine Networks Researcher: Shun Wong Last revised: April 2nd, 2005 1 Introduction ATM also known as Automatic Teller
More informationMOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS MODULE OVERVIEW. Security Policy REV 1.3, 10/2002
Security Policy MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS ENCRYPTION DLL CRYPTOGRAPHIC MODULE REV 1.3, 10/2002 CONTENTS Module Overview... 1 Scope of Document... 2 Terms and Definitions...
More informationHP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
More informationSecurity Audit Log (BC-SEC)
HELP.BCSECAUDLOG Release 4.6C SAP AG Copyright Copyright 2001 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express
More informationVeritas NetBackup Installation Guide
Veritas NetBackup Installation Guide Windows Release 6.5 12308334 NetBackup Installation Guide Copyright 1998-2007 Symantec Corporation. All rights reserved. NetBackup 6.5 Symantec, the Symantec logo,
More informationPeopleSoft Customer Relationship Management 9.1 Hardware and Software Requirements Guide
PeopleSoft Customer Relationship Management 9.1 Hardware and Software Requirements Guide June 2012 PeopleSoft Customer Relationship Management 9.1 Hardware and Software Requirements Guide SKU crm91hwsw
More informationSiebel Security Guide. Version 8.0, Rev. C February 2011
Siebel Security Guide Version 8.0, Rev. C February 2011 Copyright 2005, 2011 Oracle and/or its affiliates. All rights reserved. The Programs (which include both the software and documentation) contain
More informationSystem Requirements. SAS Profitability Management 2.2. Deployment
System Requirements SAS Profitability Management 2.2 This document provides the requirements f installing and running SAS Profitability Management 2.2 software. You must update your computer to meet these
More informationSymantec NetBackup Enterprise Server and Server 7.x OS Software Compatibility List
Symantec NetBackup Enterprise Server and Server 7.x OS Software Compatibility List Created on December 20, 2013 Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and
More informationAlliance AES Encryption for IBM i Solution Brief
Encryption & Tokenization Alliance AES Encryption for IBM i Solution Brief A Complete AES Encryption Solution Alliance AES Encryption for IBM i provides AES encryption for sensitive data everywhere it
More informationSAS 9.4 Management Console
SAS 9.4 Management Console Guide to Users and Permissions SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2015. SAS 9.4 Management Console: Guide to
More information